Weekend Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Note! The JK0-023 Exam is no longer available.

JK0-023 CompTIA Network+ certification Questions and Answers

Questions 4

Which of the following defines a rack located in an office building between the main rack and other office equipment?

Options:

A.

DSU

B.

MDF

C.

CSU

D.

IDF

Buy Now
Questions 5

Which of the following is similar to MIMO?

Options:

A.

WPA

B.

SSID

C.

PoE

D.

Diversity

Buy Now
Questions 6

Which of the following cable types is required to run through an air duct?

Options:

A.

UTP

B.

Fiber

C.

PVC

D.

Plenum

Buy Now
Questions 7

A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?

Options:

A.

nbstat

B.

arp

C.

nslookup

D.

ipconfig

Buy Now
Questions 8

Which of the following is true of a client/server topology?

Options:

A.

Virtual servers are used to stream data to other remote servers

B.

Servers are used to connect to centralized clients

C.

Remote clients connect to a centralized server

D.

Remote clients connect to each other via a virtual server

Buy Now
Questions 9

Which of the following protocols could the below packet capture be from?

Port: 161

msgVersion:

msgUsername:

msgAuthenticationParameters:

msgPrivacyParameters:

msgData:

data: get-request

request-id:

error-status: noError (0)

error-index: 0

variable-bindings: 0 items

Options:

A.

SNMPv3

B.

SSH

C.

HTTP

D.

SNMPv1

Buy Now
Questions 10

A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration?

Options:

A.

Protocol analyzer

B.

ipconfig

C.

nslookup

D.

tracert

Buy Now
Questions 11

Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?

Options:

A.

Cable tester

B.

Toner probe

C.

Cable crimper

D.

Punch down tool

Buy Now
Questions 12

Which of the following is used to filter outgoing network requests?

Options:

A.

Proxy server

B.

VPN concentrator

C.

DHCP server

D.

IIS server

Buy Now
Questions 13

Which of the following network devices hides network nodes behind one public IP address?

Options:

A.

Layer 3 switch

B.

Content filter

C.

VPN server

D.

Proxy server

Buy Now
Questions 14

Which of the following commands will provide an administrator with the number of hops a packet takes from host to host?

Options:

A.

nslookup

B.

ping

C.

traceroute

D.

route

Buy Now
Questions 15

Users have reported slow access times when retrieving information from a server on the company’s network. Which of the following tools would provide access time information on each segment of the network to reach the server?

Options:

A.

arp

B.

route

C.

ipconfig

D.

tracert

Buy Now
Questions 16

Which of the following defines access for a network?

Options:

A.

ACL

B.

RDP

C.

RAS

D.

ARP

Buy Now
Questions 17

Users are reporting a large decrease in network performance. After further investigation, the network administrator notices large amounts of traffic coming from a specific IP address. The network administrator needs to identify the payload of the network traffic. Which of the following could be used to collect that information?

Options:

A.

ipconfig

B.

ping

C.

sniffer

D.

route

Buy Now
Questions 18

A company recently added an addition to their office building. A technician runs new plenum network cables from the switch on one side of the company's gymnasium 80 meters (262 ft.) to the new offices on the other side, draping the wires across the light fixtures. Users working out of the new offices in the addition complain of intermittent network connectivity. Which of the following is MOST likely the cause of the connectivity issue?

Options:

A.

dB loss

B.

Distance

C.

Incorrect connector type

D.

EMI

E.

Crosstalk

Buy Now
Questions 19

Which of the following is the control when observing network bandwidth patterns over time?

Options:

A.

Network log

B.

Baseline

C.

Flow data

D.

Interface statistics

Buy Now
Questions 20

Users report that their Internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video and music. Which of the following would BEST confirm Zach’s theory?

Options:

A.

Traffic analysis

B.

SNMP

C.

History logs

D.

System logs

Buy Now
Questions 21

A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?

Options:

A.

Change management

B.

Asset management

C.

Access log

D.

Baselines

Buy Now
Questions 22

Lisa, a technician, is asked to install a wireless router in a company’s public café area. The company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?

Options:

A.

Content filtering on the wireless access point

B.

Allow traffic from the wireless access point

C.

Block traffic from the wireless access point

D.

Packet filtering on the wireless access point

Buy Now
Questions 23

A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC?

Options:

A.

System log

B.

History log

C.

Network sniffer

D.

Nslookup

Buy Now
Questions 24

Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network?

Options:

A.

Decrease signal strength on the antenna

B.

Change the wireless channel on the WAP

C.

Change the device placement to further obfuscate the signal

D.

Set up encryption on the WAP and clients

Buy Now
Questions 25

An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?

Options:

A.

Baseline analyzer

B.

Ping

C.

Protocol analyzer

D.

Nessus

Buy Now
Questions 26

Which of the following protocols works at the LOWEST layer of the OSI model?

Options:

A.

L2TP

B.

PPTP

C.

ISAKMP

D.

IPSec

Buy Now
Questions 27

A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?

Options:

A.

TCP

B.

SMTP

C.

ICMP

D.

ARP

Buy Now
Questions 28

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?

Options:

A.

Evil twin

B.

War chalking

C.

Buffer overflow

D.

Virus

Buy Now
Questions 29

Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?

Options:

A.

VLAN

B.

MPLS

C.

VPN

D.

PSTN

Buy Now
Questions 30

Kim, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?

Options:

A.

MS-CHAP

B.

Kerberos

C.

TACACS+

D.

PKI

Buy Now
Questions 31

Which of the following antenna types has a flat circular radiation pattern?

Options:

A.

Diversity

B.

Yagi

C.

Omni

D.

Patch

Buy Now
Questions 32

Sandy, a user, is unable to access the Internet. The network administrator notices that the workstation has an APIPA address. Which of the following is MOST likely not functioning correctly in this situation?

Options:

A.

Broadcast address

B.

Multicast address

C.

DNS

D.

DHCP

Buy Now
Questions 33

Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use?

Options:

A.

OTDR

B.

Multimeter

C.

Punch down tool

D.

Temperature monitor

Buy Now
Questions 34

Which of the following connector types is only used with copper media?

Options:

A.

ST

B.

SC

C.

MTRJ

D.

DB-9

Buy Now
Questions 35

Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 36

Which of the following is associated with DNS reverse lookup zones?

Options:

A.

CNAME

B.

TXT

C.

PTR

D.

MX

Buy Now
Questions 37

A network administrator wants to perform a test to see if any systems are passing clear text through the network. Which of the following would be used?

Options:

A.

Social engineering

B.

Packet sniffing

C.

Rogue access point

D.

Man-in-the-middle

Buy Now
Questions 38

A technician is terminating a new run of network cables to a 110 block. Which of the following tools would the technician use?

Options:

A.

Loopback plug

B.

Crimper tool

C.

Punch down tool

D.

Cable tester

Buy Now
Questions 39

The components of a NIC function at which of the following layers of the OSI model? (Select TWO).

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

E.

Layer 5

Buy Now
Questions 40

A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems?

Options:

A.

Firewalls

B.

VLANs

C.

Channels

D.

Antenna types

Buy Now
Questions 41

Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?

Options:

A.

HTTPS

B.

SSH

C.

RSA

D.

SSL

Buy Now
Questions 42

A new WAP is configured to only use 802.11g with SSID broadcasts enabled. The encryption is set to WPA and the key is given to the user. A user near the WAP is using a laptop equipped with a 5GHz wireless card and is not able to see the SSID. Which of the following is the problem?

Options:

A.

Latency

B.

Incorrect encryption type

C.

EUI-64

D.

Incompatible hardware

Buy Now
Questions 43

Which of the following technologies can change channel widths?

Options:

A.

802.11a

B.

802.11b

C.

802.11n

D.

Bluetooth

Buy Now
Questions 44

1000BaseT has a MAXIMUM run distance of:

Options:

A.

25 meters (82 feet).

B.

100 meters (328 feet).

C.

500 meters (1640 feet).

D.

1000 meters (3280 feet).

Buy Now
Questions 45

Kim, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Kim purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?

Options:

A.

Install two CAT6 cables with a repeater.

B.

Install a 500 foot (152 meter) CAT5 cable.

C.

Install a 500 foot (152 meter) CAT5e cable.

D.

Install three CAT6 cables with a repeater.

Buy Now
Questions 46

Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used?

Options:

A.

traceroute

B.

ping

C.

ipconfig

D.

netstat

Buy Now
Questions 47

When troubleshooting a connectivity issue, which of the following commands will give Joe, the technician, a list of the host names connected to the network?

Options:

A.

ping

B.

nbstat

C.

arp

D.

msconfig

Buy Now
Questions 48

Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOST likely connecting?

Options:

A.

A 110 block

B.

A demarc

C.

A DB-9

D.

A smart jack

Buy Now
Questions 49

Which of the following cable types is unshielded?

Options:

A.

STP

B.

Twinax

C.

UTP

D.

Coax

Buy Now
Questions 50

A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?

Options:

A.

WPA

B.

WPA2

C.

WEP

D.

VPN

Buy Now
Questions 51

Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?

Options:

A.

PKI

B.

TACACS+

C.

CHAP

D.

SSH

Buy Now
Questions 52

Companies trying to cut down on constant documentation of IP addresses could use which of the following?

Options:

A.

Longer lease times

B.

More reservations

C.

Larger scopes

D.

Dynamic IP addressing

Buy Now
Questions 53

In a SOHO environment, placing a VoIP unit on the outside edge of a LAN router enhances which of the following network optimization methods?

Options:

A.

Load balancing

B.

Quality of service

C.

Fault tolerance

D.

Traffic shaping

Buy Now
Questions 54

Which of the following protocols can be implemented to provide encryption during transmission between email gateways?

Options:

A.

TLS

B.

PPTP

C.

SSH

D.

HTTPS

Buy Now
Questions 55

Which of the following connector types would be found with a VoIP system utilizing CAT6 cabling?

Options:

A.

SC

B.

RJ-45

C.

RJ-11

D.

BNC

Buy Now
Questions 56

Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connection to a windows server?

Options:

A.

80

B.

445

C.

3000

D.

3389

Buy Now
Questions 57

Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO).

Options:

A.

dig

B.

nslookup

C.

nbstat

D.

ifconfig

E.

ipconfig

Buy Now
Questions 58

A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?

Options:

A.

RADIUS

B.

Single sign on

C.

Multifactor authentication

D.

Two-factor authentication

Buy Now
Questions 59

A user reports intermittent network connectivity. Which of the following should a technician configure on the managed switch to help troubleshoot this issue?

Options:

A.

SMTP

B.

SNTP

C.

SNMP

D.

SNAT

Buy Now
Questions 60

Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics?

Options:

A.

Protocol analyzer

B.

Syslog server

C.

Packet sniffer

D.

IPS logs

Buy Now
Questions 61

A user is having trouble with their fax machine disconnecting during transmissions. The technician believes that a DSL signal may be on the same line as the fax. Which of the following tools would MOST likely help prove this hypothesis?

Options:

A.

Multimeter

B.

Cable tester

C.

Lineman's handset

D.

Toner probe

Buy Now
Questions 62

After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?

Options:

A.

Multimeter

B.

Cable certifier

C.

Cable tester

D.

Toner probe

Buy Now
Questions 63

A company has been just opened a new site in another country. Both sites share information across the WAN continuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible?

Options:

A.

Traffic shaping

B.

QoS

C.

Caching engines

D.

High availability

Buy Now
Questions 64

Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?

Options:

A.

Loopback plugs

B.

Butt set

C.

Cable certifier

D.

Toner probe

Buy Now
Questions 65

Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used?

Options:

A.

Butt set

B.

Toner probe

C.

Wire mapper

D.

Cable certifier

Buy Now
Questions 66

A technician receives a work order that a user can no longer access any external websites. The user is the only one affected, but can still access websites by IP address. Which of the following is the MOST likely cause?

Options:

A.

The workstation has been removed from the domain and needs to be re-added in directory services.

B.

The workstation is configured to use the IPv4 protocol instead of IPv6.

C.

The workstation is configured with an incorrect IP address of the DNS server.

D.

The workstation’s DHCP IP address has expired and has assigned itself an APIPA address.

Buy Now
Questions 67

Which of the following is an example of a Class C address?

Options:

A.

10.19.0.79

B.

127.34.8.197

C.

176.96.1.222

D.

192.168.1.105

Buy Now
Questions 68

An organization is considering migrating a datacenter to a different operating system. Which of the following could the organization use to try out the new OS before making a wide-scale deployment?

Options:

A.

Virtual PBXs

B.

Virtual Switches

C.

Virtual Servers

D.

Virtual Desktops

Buy Now
Questions 69

A user reports that they are unable to connect to the network. Upon further investigation, a technician notices that the user has an IP address/subnet mask combination of 192.168.204.255/24. The default gateway for the network is 192.168.204.254. Which of the following could the user’s IP address be changed to so that they could connect to the network?

Options:

A.

192.168.204.0/27

B.

192.168.204.1/27

C.

192.168.204.112/24

D.

192.168.204.254/24

Buy Now
Questions 70

Which of the following protocols is commonly used for VoIP technology?

Options:

A.

Telnet

B.

SMTP

C.

SIP

D.

SNMP

Buy Now
Questions 71

In order for switching loops to be automatically disabled, which of the following needs to be implemented?

Options:

A.

Routing tables

B.

Collision domains

C.

Port mirroring

D.

Spanning-tree protocol

Buy Now
Questions 72

Which of the following would Kim, a technician, use in voice over IP communications?

Options:

A.

SNTP

B.

SCP

C.

SMTP

D.

SIP

Buy Now
Questions 73

Which of the following DNS records would be queried to locate a company’s mail server?

Options:

A.

A

B.

MX

C.

AAAA

D.

CNAME

Buy Now
Questions 74

A company would like their technicians to be able to connect to employee desktops remotely via RDP. Which of the following default port numbers need to be opened on the firewall to support this?

Options:

A.

143

B.

443

C.

3389

D.

8080

Buy Now
Questions 75

Which of the following allows for groups of ports on the same switch to operate as a part of different segmented networks?

Options:

A.

RIP

B.

STP

C.

VLAN

D.

MTU

Buy Now
Questions 76

Which of the following uses types and codes rather than ports?

Options:

A.

EIGRP

B.

ICMP

C.

UDP

D.

IPv6

Buy Now
Questions 77

Which of the following routing protocols can be utilized as both an IGP and EGP?

Options:

A.

EIGRP

B.

RIP

C.

IGRP

D.

RIPv2

Buy Now
Questions 78

An administrator has added QoS settings to the LAN switches prioritizing RTP. Which of the following systems is the Administrator MOST concerned with in this scenario?

Options:

A.

Phone communications

B.

Web site downloads

C.

Streaming video clients

D.

Client bittorrent abilities

Buy Now
Questions 79

Which of the following ports is the default telnet port?

Options:

A.

20

B.

21

C.

22

D.

23

Buy Now
Questions 80

Which of the following protocols is used to send time synchronization updates on a given network?

Options:

A.

NTP

B.

POP3

C.

DNS

D.

IMAP

Buy Now
Questions 81

At which layer of the OSI and TCP/IP model would HTTP and FTP be found?

Options:

A.

Application

B.

Network

C.

Session

D.

Data Link

Buy Now
Questions 82

A forward lookup zone converts which of the following?

Options:

A.

IP addresses to hostnames

B.

Hostnames to IP addresses

C.

MAC addresses to IP addresses

D.

IP Addresses to MAC addresses

Buy Now
Questions 83

Which of the following protocols is the BEST choice for retrieving email on multiple devices?

Options:

A.

IMAP4

B.

SMTP

C.

FTP

D.

SNMPv3

Buy Now
Questions 84

Frame relay occurs at which of the following layers of the OSI model?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 4

D.

Layer 6

Buy Now
Questions 85

Which of the following would be considered a Class C private address?

Options:

A.

10.0.0.125

B.

192.168.50.125

C.

192.169.0.132

D.

255.255.255.0

Buy Now
Questions 86

Which of the following ports would have to be allowed through a firewall for NTP to pass on its default port?

Options:

A.

123

B.

143

C.

153

D.

163

Buy Now
Questions 87

Which of the following protocols resolves IP addresses to MAC addresses?

Options:

A.

DNS

B.

ARP

C.

RARP

D.

NTP

Buy Now
Questions 88

A user reports they are unable to access a file on a mapped network drive. A technician discovers the server where the file is located did not come back online after last night’s power outage and manually powers the server back online. The technician then verifies the user can connect to their file. Which of the following troubleshooting steps should the technician do NEXT?

Options:

A.

Escalate by following change procedures

B.

Establish a plan of action to resolve the problem

C.

Document findings, actions, and outcomes

D.

Question the user

Buy Now
Questions 89

A network administrator notices that load balancing is not working properly on the web cluster as previously configured. In speaking with management, a change to the IP addressing scheme was made yesterday which possibly affected one member of the cluster. Due to the timing of the events, the administrator theorizes that this change caused the problem. Which of the following should the administrator do NEXT?

Options:

A.

Escalate to the management team

B.

Change the IP address back to its previous state

C.

Test the theory by analyzing logs

D.

Create a plan of action to present to management

Buy Now
Questions 90

The network technician needs to install fiber cabling to connect two buildings less than 984 feet (300 meters) apart. Which of the following fiber types should be installed?

Options:

A.

Singlemode

B.

Multimode

C.

Crossover

D.

F-Connector

Buy Now
Questions 91

Which of the following is a common connector used on a coaxial cable?

Options:

A.

RJ-45

B.

DB-25

C.

BNC

D.

LC

Buy Now
Questions 92

After installing a SOHO wireless router, Joe, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an Internet web server as coming from the router’s public interface IP address. Which of the following must Joe implement to assign a different public IP from the router’s public interface IP address to one of the workstations in the office?

Options:

A.

NAT

B.

PAT

C.

DMZ

D.

ACL

Buy Now
Questions 93

A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?

Options:

A.

Man-in-the-middle

B.

Social engineering

C.

Phishing

D.

DoS

Buy Now
Questions 94

A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?

Options:

A.

Packet sniffing

B.

Packet filter

C.

Stateful inspection

D.

Content filter

Buy Now
Questions 95

Which of the following authentication methods is MOST secure?

Options:

A.

NTLM

B.

CHAP

C.

MS-CHAP

D.

Kerberos

Buy Now
Questions 96

Sandy, an administrator, determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

Options:

A.

DDoS

B.

Viruses

C.

Worms

D.

Man-in-the-middle

Buy Now
Questions 97

Which of the following is a social engineering attack?

Options:

A.

Worms

B.

Man-in-the-middle

C.

Phishing

D.

Evil twin

Buy Now
Questions 98

A technician is asked to filter inbound and outbound traffic of a specific service on the network. Which of the following would BEST allow the technician to comply with the request?

Options:

A.

MAC filtering

B.

IP filtering

C.

Port filtering

D.

Content filtering

Buy Now
Questions 99

A network administrator is tasked with blocking unwanted spam which is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?

Options:

A.

Closing off port 25 on the firewall

B.

Closing off port 53 on the firewall

C.

Turning off the SMTP service on the email server

D.

Turning off the IMAP service on the email server

Buy Now
Questions 100

Which of the following will a firewall NOT protect the network from?

Options:

A.

Intrusion

B.

DDoS

C.

Denial of Service

D.

Spam e-mails

Buy Now
Questions 101

A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?

Options:

A.

Packet sniffer

B.

Stateless firewall

C.

Packet filter

D.

Stateful firewall

Buy Now
Questions 102

A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?

Options:

A.

Evil twin

B.

Phishing

C.

Man-in-the-middle

D.

Social engineering

Buy Now
Questions 103

A network technician has recently discovered rogue devices on their network and wishes to implement a security feature that will prevent this from occurring. Which of the following will prevent unauthorized devices from connecting to a network switch?

Options:

A.

Implement 802.11i on all switches in the network.

B.

Implement port security on all computers in the company.

C.

Implement port security on all switches in the network.

D.

Implement rules on the firewall to block unknown devices.

Buy Now
Questions 104

Which of the following network tools is used to identify running services on host devices?

Options:

A.

IDS

B.

IPS

C.

Firewall

D.

NMAP

Buy Now
Questions 105

A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?

Options:

A.

PKI

B.

Kerberos

C.

Single sign-on

D.

CHAP

Buy Now
Questions 106

An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).

Options:

A.

Allow TCP port 23

B.

Allow TCP port 25

C.

Allow TCP port 110

D.

Allow UDP port 25

E.

Allow UDP port 110

Buy Now
Questions 107

Which of the following is used by RADIUS to encrypt messages between the server and the client?

Options:

A.

Public key

B.

CSU/DSU

C.

Private key

D.

Shared secret

Buy Now
Questions 108

A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).

Options:

A.

802.1q

B.

MAC address filtering

C.

WPA2 Personal

D.

WPA Enterprise

E.

802.1x

Buy Now
Questions 109

Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?

Options:

A.

100 kilometers (62 miles)

B.

10 kilometers (6 miles)

C.

1000 meters (3281 feet)

D.

100 meters (328 feet)

Buy Now
Questions 110

A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this?

Options:

A.

Crossover

B.

Rollover

C.

Loopback

D.

Straight cable

Buy Now
Questions 111

Which of the following is MOST likely used with RG-6 media?

Options:

A.

MTRJ

B.

RJ-11

C.

RJ-45

D.

F-connector

Buy Now
Questions 112

Which of the following cable types would have the LEAST amount of EMI?

Options:

A.

CAT3

B.

CAT5

C.

STP CAT6

D.

Plenum CAT6

Buy Now
Questions 113

Which of the following connectors push and twist-on?

Options:

A.

LC

B.

SC

C.

ST

D.

RJ-45

Buy Now
Questions 114

Which of the following is used for SONET connections and requires a wavelength of 1310nm?

Options:

A.

10GBASECX4

B.

10GBASELX4

C.

10GBASELW

D.

10GBASESR

Buy Now
Questions 115

A user’s network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause?

Options:

A.

DB loss on the cable

B.

Interference

C.

Split cable

D.

Distance limitations

Buy Now
Questions 116

T568B wiring scheme is typically found on which of the following components?

Options:

A.

Demarc extension

B.

66 block

C.

Patch panel

D.

Vertical cross connect

Buy Now
Questions 117

Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance?

Options:

A.

T1 crossover

B.

Singlemode fiber

C.

CAT6a

D.

Coaxial

Buy Now
Questions 118

An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using?

Options:

A.

MIMO

B.

AP isolation

C.

Channel bonding

D.

Burst mode

Buy Now
Questions 119

Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?

Options:

A.

Redundancy

B.

Fault tolerance

C.

Unified communications

D.

Data integrity requirements

Buy Now
Questions 120

A technician has low signal strength connecting two wireless bridges. Which of the following could be the problem?

Options:

A.

Low PoE wattage

B.

Opposing antenna polarizations

C.

Short distance between antennas

D.

WPA 2 encryption

Buy Now
Exam Code: JK0-023
Exam Name: CompTIA Network+ certification
Last Update: Nov 27, 2023
Questions: 1112
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 20 May 2024